Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable Linux tree or
a minimally backported form of that patch. The following upstream
stable patches should be included in the Ubuntu kernel:
upstream stable patchset 2021-07-20
Ported from the following upstream stable releases:
v5.10.48, v5.12.15
v5.10.49, v5.12.16
from git://git.kernel.org/
scsi: sr: Return appropriate error code when disk is ejected
gpio: mxc: Fix disabled interrupt wake-up support
drm/nouveau: fix dma_address check for CPU/GPU sync
gpio: AMD8111 and TQMX86 require HAS_IOPORT_MAP
UBUNTU: [Config] update annotations for GPIO_TQMX86
Revert "KVM: x86/mmu: Drop kvm_mmu_extended_role.cr4_la57 hack"
s390/vfio-ap: clean up mdev resources when remove callback invoked
UBUNTU: upstream stable to v5.10.48, v5.12.15
media: uvcvideo: Support devices that report an OT as an entity source
Hexagon: fix build errors
Hexagon: add target builtins to kernel
Hexagon: change jumps to must-extend in futex_atomic_*
UBUNTU: upstream stable to v5.10.49, v5.12.16
** Affects: linux (Ubuntu)
Importance: Undecided
Status: Invalid
** Affects: linux (Ubuntu Hirsute)
Importance: Medium
Assignee: Kamal Mostafa (kamalmostafa)
Status: In Progress
** Tags: kernel-stable-tracking-bug
** Changed in: linux (Ubuntu)
Status: New => Confirmed
** Tags added: kernel-stable-tracking-bug
** Also affects: linux (Ubuntu Hirsute)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Hirsute)
Status: New => In Progress
** Changed in: linux (Ubuntu Hirsute)
Importance: Undecided => Medium
** Changed in: linux (Ubuntu Hirsute)
Assignee: (unassigned) => Kamal Mostafa (kamalmostafa)
** Changed in: linux (Ubuntu)
Status: Confirmed => Invalid
** Description changed:
+ SRU Justification
- SRU Justification
+ Impact:
+ The upstream process for stable tree updates is quite similar
+ in scope to the Ubuntu SRU process, e.g., each patch has to
+ demonstrably fix a bug, and each patch is vetted by upstream
+ by originating either directly from a mainline/stable Linux tree or
+ a minimally backported form of that patch. The following upstream
+ stable patches should be included in the Ubuntu kernel:
- Impact:
- The upstream process for stable tree updates is quite similar
- in scope to the Ubuntu SRU process, e.g., each patch has to
- demonstrably fix a bug, and each patch is vetted by upstream
- by originating either directly from a mainline/stable Linux tree or
- a minimally backported form of that patch. The following upstream
- stable patches should be included in the Ubuntu kernel:
+ upstream stable patchset 2021-07-20
- upstream stable patchset 2021-07-20
- from git://git.kernel.org/
+ Ported from the following upstream stable releases:
+ v5.10.48, v5.12.15
+ v5.10.49, v5.12.16
+
+ from git://git.kernel.org/
+
+ scsi: sr: Return appropriate error code when disk is ejected
+ gpio: mxc: Fix disabled interrupt wake-up support
+ drm/nouveau: fix dma_address check for CPU/GPU sync
+ gpio: AMD8111 and TQMX86 require HAS_IOPORT_MAP
+ UBUNTU: [Config] update annotations for GPIO_TQMX86
+ Revert "KVM: x86/mmu: Drop kvm_mmu_extended_role.cr4_la57 hack"
+ s390/vfio-ap: clean up mdev resources when remove callback invoked
+ UBUNTU: upstream stable to v5.10.48, v5.12.15
+ media: uvcvideo: Support devices that report an OT as an entity source
+ Hexagon: fix build errors
+ Hexagon: add target builtins to kernel
+ Hexagon: change jumps to must-extend in futex_atomic_*
+ UBUNTU: upstream stable to v5.10.49, v5.12.16
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1936969
Title:
Hirsute update: upstream stable patchset 2021-07-20
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1936969/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs